If your backup can be reached by a ransomware, it's not a backup.
Technology
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
Tell that to 90% of Veeam deployments.
Why name drop Veeam as if they're part of the problem?
They at least have good options to protect backups from ransomware with Linux hardened repos and immutable object storage.
Because Veeam can be good, but it's only as good as the user pays for. I do ransomware recovery and incident response management for a living. More often than not, Veeam is implemented poorly and does not do what the customer thinks they paid for.
I still fail to see how that's the product's fault.
Is there some ransomware-proof backup solution that you find most people do set up correctly?
It's not specifically fault of the product. However, in my experience in this field, the only time client backups are encrypted is due to a false sense of security due to negligence and ignorance.
Veeam should not be configured by an inexperienced or underfunded tech staff.
Tape, probably /s
The joke is on them. I don't back up anything.
Production is for testing and for data archiving. Think of the money we'll save!
Stories like this make me want to retire early. Most bosses just aren't willing to pay for sufficient cybersecurity.
My boss encrypts nothing and leaves all of the machines switched on overnight, every night.
We got burgled once and someone made off with some postcards and £5 in loose change, overlooking access to a vast trove of customers highly exposing personal, financial, medical and legal documents that has never been purged for over a decade.
He didn't even change anything afterwards!
To be fair, the common thief isn't into that sort of burglary. They're looking for something they can pawn or use themselves
Especially something that can be anonymised and moved quickly. For all they know, the computers are heavy/locked down, and may be tracked.
Is your boss Denholm Reynholm?
Burn read only backups.
They'll never encrypt my 2000 DVDs!
What methods are they using to locate the backups?
Come attack mine. It’s kept off my property on a hard drive disconnected from everything. Update it every 6 months.
looks at stack of back up hard drives physically unplugged on the shelf
k.